Deploying Security Policy in Intra and Inter Workflow Management Systems.
Samiha AyedNora Cuppens-BoulahiaFrédéric CuppensPublished in: ARES (2009)
Keyphrases
- workflow management systems
- security policies
- security management
- business processes
- access control
- workflow management
- business process
- network security
- distributed systems
- security requirements
- workflow systems
- security concerns
- network management
- mobile agents
- process model
- virtual enterprise
- control flow
- ubiquitous computing environments
- access control mechanism
- event logs
- workflow execution
- anomaly detection
- e government
- database systems
- unauthorized access
- databases